These Notes cover Chapter 13 of the Principles of Business Information Systems textbook used in Informatics 112 at the University of Pretoria. This Chapter covers the topic of Information Systems in Business and Society.
INFORMATION
SYSTEMS IN BUSINESS
AND SOCIETY
______________________________________________________________________________________________
SECURITY, PRIVACY AND ETHICAL ISSUES
COMPUTER WASTE AND MISTAKES
Steps to Preventing Computer-Related Waste and Mistakes
1. Establishing Policies and Procedures
This regards efficient acquisition, use and disposal of systems and devices.
The types of computer-related mistakes include the following:
→ Data-entry or data-capture errors
→ Errors in computer programs
→ Errors in handling files, including formatting a disc by mistake, copying an old
file over a newer one and deleting a file by mistake.
→ Mishandling of computer output.
2. Implementing Policies and Procedures
Useful policies to minimize waste and mistakes include the following:
→ HTML and URLs should be tightly controlled with all changes authorized by
responsible owners and
→ documented.
→ A user manual should be available that covers operating procedures and
documents the management and control of the application.
→ Each system report should indicate its general content in its title and specify
the time period it covers.
→ The system should have controls to prevent invalid and unreasonable data
entry.
3. Monitoring Policies and Procedures
, 4. Reviewing Policies and Procedures
During review, people should ask the following questions:
→ Do current policies cover existing practices adequately?
→ Is the organization planning any new activities in the future? If so, does it
need new policies or procedures on who will handle them and what must
be done?
→ Are contingencies and disasters covered?
COMPUTER CRIME
TYPES OF COMPUTER CRIME:
1. Identity Theft
Imposter obtains personal identification information
→ e.g. ID or driver’s license numbers in order to impersonate someone else
→ WHY?
To obtain credit, merchandise, and services in the name of the victim and to
have false credentials
SOCIAL ENGINEERING: Using one’s social skills to get computer users to provide you with
information to access an information system or its data.
2. Cyberterrorism
A Cyberterrorist intimidates or coerces a government or organization to
advance his/her political or social objectives by launching computer-based
attacks against computers, networks, and information stored on them.
3. Illegal access and use
CRACKER: A person who enjoys computer technology and spends time learning and using
computer systems.
SCRIPT KIDDIE: A cracker with little technical savvy who downloads programs called scripts,
which automate the job of breaking into computers.
4.
INSIDER: An employee working solo or in concert with outsiders to compromise corporate systems.
VIRUS: A computer program file capable of attaching to discs or other files and replicating itself
repeatedly, typically without the user’s knowledge or permission.
WORM: A parasitic computer program that can create copies of itself on the infected computer
or send copies to other computers via a network.
TROJAN HORSE: program is a malicious program that disguises itself as a useful application
and purposefully does something the user does not expect.
5. Equipment theft
6. Software and internet software piracy
Software is protected by copyright laws
Copyright law violations entails
→ Making additional copies
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller MicaelaEckard. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for R50,00. You're not tied to anything after your purchase.